Page 277 - Cyber Defense eMagazine RSAC Special Edition 2025
P. 277

Quantum-Resistant Cryptography: The Perfect Partner

             ZTA is powerful, but it is not the only solution. To respond fully to quantum threats, we need quantum-
            resistant cryptography – the algorithms intended for use against quantum attacks. The National Institute
            of Standards and Technology (NIST) is the leading body in standardizing options like these:

               •  Lattice-Based  Cryptography:  The  cryptography  based  on  complex  lattice  mathematics.
                   CRYSTALS – Kyber (NIST selected) is one of them.
               •  Hash-Based Cryptography: Cryptography based on quantum-proof hash functions. SPHINCS+
                   is excellent.
               •  Code Based Cryptography: The security of this system is based on error correcting codes. As
                   an example, McEliece has proved its effectiveness.
               •  Multivariate Cryptography: It solves complex equations. Rainbow is a notable scheme.
               •  Isogeny-Based Cryptography: It uses secure key exchange using elliptic curve isogenies.



            These combined with ZTA provide a layered defense. Picture a cybersecurity onion: peel one layer, and
            another stands strong.








































                                    Fig. 3: Five Pillars of Quantum-Resistant Cryptography








                                                                                                            277
   272   273   274   275   276   277   278   279   280   281   282